Sat.Jun 23, 2018 - Fri.Jun 29, 2018

article thumbnail

California Unanimously Passes Historic Privacy Bill

WIRED Threat Level

The law will give Californians more control over the data that companies collect on them than ever before.

Privacy 103
article thumbnail

IEEE Statement on Strong Encryption vs. Backdoors

Schneier on Security

The IEEE came out in favor of strong encryption: IEEE supports the use of unfettered strong encryption to protect confidentiality and integrity of data and communications. We oppose efforts by governments to restrict the use of strong encryption and/or to mandate exceptional access mechanisms such as "backdoors" or "key escrow schemes" in order to facilitate government access to encrypted data.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Stop DDoS Attacks: 6 Tips for Fighting DDoS Attacks

eSecurity Planet

Stopping a DDoS attack quickly is critical for the survival of your business. Here are six ways you can stop a DDoS attack.

111
111
article thumbnail

Plant Your Flag, Mark Your Territory

Krebs on Security

Many people, particularly older folks, proudly declare they avoid using the Web to manage various accounts tied to their personal and financial data — including everything from utilities and mobile phones to retirement benefits and online banking services. The reasoning behind this strategy is as simple as it is alluring: What’s not put online can’t be hacked.

Paper 206
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Marketing Firm Exposes 340 Million Records on US Consumers

Data Breach Today

2 Terabyte Database Includes Up To 150 Fields With US Consumers' Data A computer security researcher has discovered a vast marketing database containing 340 million records on U.S. consumers. The database is the latest in a long line of databases to have been left exposed to the internet without authentication, thus putting people's personal data at risk.

Marketing 181

More Trending

article thumbnail

The Re-Permissioning Dilemma Under GDPR

AIIM

Now that the EU General Data Protection Regulation (GDPR) is in force organizations are ramping up their efforts to re-fresh data subject consent obtained prior to GDPR and under the EU Data Protection Directive 95/46/EC by virtue of which opt-out, or implied consent was permissible. There seems to be divergent opinions relating to the requirement to undertake re-permissioning of data subject consent under GDPR.

GDPR 114
article thumbnail

How to Avoid Card Skimmers at the Pump

Krebs on Security

Previous stories here on the proliferation of card-skimming devices hidden inside fuel pumps have offered a multitude of security tips for readers looking to minimize their chances of becoming the next victim, such as favoring filling stations that use security cameras and tamper-evident tape on their pumps. But according to police in San Antonio, Texas, there are far more reliable ways to avoid getting skimmed at a fuel station.

article thumbnail

Ticketmaster Breach Traces to Embedded Chatbot Software

Data Breach Today

Hacker Modified JavaScript Chatbot to Scrape Customers' Card Payment Details Ticketmaster is warning customers that it suffered a data breach after an attacker modified its third-party chatbot software to steal customers' payment card details. Software provider Inbenta Technologies says Ticketmaster should never have been running the JavaScript software on a payments page.

article thumbnail

We're Baking Have I Been Pwned into Firefox and 1Password

Troy Hunt

Pretty much every day, I get a reminder from someone about how little people know about their exposure in data breaches. Often, it's after someone has searched Have I Been Pwned (HIBP) and found themselves pwned somewhere or other. Frequently, it's some long-forgotten site they haven't even thought about in years and also frequently, the first people know of these incidents is via HIBP: large @ticketfly data breach. thanks @troyhunt for the excellent @haveibeenpwned service that notifies users o

Passwords 108
article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

AI Could Vastly Improve Our Work Lives

AIIM

Artificial intelligence has the ability to change our lives for the better. Increasingly, businesses are looking to automation to complete tasks in a more cost effective and efficient manner. Unfortunately, automation may lead to job loss. In fact, the finance, manufacturing, and service industries have already cut jobs due to automation. While there are certainly risks posed by the advancement of AI, there are also several benefits.

article thumbnail

The New Satellite Arms Race Threatening to Explode in Space

WIRED Threat Level

Trump’s call for a “Space Force” escalates a quiet, dangerous contest between the US, China, and Russia—one whose consequences no one really understands.

Security 110
article thumbnail

Supreme Court Rules on Mobile Location Data: Get a Warrant

Data Breach Today

ACLU Says Decision 'Provides a Groundbreaking Update to Privacy Rights' The U.S. Supreme Court has ruled that location data generated by mobile phones is protected by the Fourth Amendment, meaning police need "probable cause" before they can access it. The ACLU says the ruling "provides a groundbreaking update to privacy rights" in the digital age.

Privacy 132
article thumbnail

California Enacts Broad Privacy Laws Modeled on GDPR

Data Matters

On June 28, 2018, California Gov. Jerry Brown signed into law the California Consumer Privacy Act of 2018 (AB 375). According to the bill’s author, it was consciously designed to emulate the new European General Data Protection Regulation (GDPR) that went into effect on May 25, and if and when it goes into effect, it would constitute the broadest privacy law in the United States.

GDPR 79
article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Q&A: Saadia Muzaffar talks responsible innovation, diversity, and the OpenText Women in Technology Summit

OpenText Information Management

If you don’t already know her, it’s time you met Saadia Muzaffar. Saadia is an incredible tech entrepreneur, author, and passionate advocate of responsible innovation. In addition, Saadia is driving forward the agenda of decent work for everyone, prosperity of immigrant talent in STEM careers, and diversity and inclusion in the Canadian technology industry.

89
article thumbnail

Marketing Firm Exactis Leaked a Personal Info Database With 340 Million Records

WIRED Threat Level

The leak may include data on hundreds of millions of Americans, with hundreds of details for each, from demographics to personal interests.

Marketing 111
article thumbnail

8 Highlights: Scottish 'Big Data' Cybersecurity Conference

Data Breach Today

Cloud Forensics, Fraud, Extortion and Cyber Sociology Dominate Edinburgh Event What are hot cybersecurity topics in Scotland? The "International Conference on Big Data in Cyber Security" in Edinburgh focused on everything from securing the internet of things the rise of CEO fraud to the origins of "cyber" and how to conduct digital forensic investigations on cloud servers.

Big data 124
article thumbnail

Infographic: List of data breaches in 2017

IT Governance

2017 was a big year for data breaches. Uber , Equifax and Yahoo all fell victim, and many small organisations also suffered a breach or cyber attack. When it comes to cyber threats, all types of organisations are at risk. Using the findings of our monthly ‘list of data breaches and cyber attacks’ blog posts, we’ve created an infographic that summarises reported data breaches from 2017.

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

European regulators report sharp rise in complaints after GDPR

The Guardian Data Protection

Watchdogs reveal more data protection complaints and increase in breach notifications The first month of GDPR has seen a sharp increase in the number of complaints to regulators across Europe, showing strong public interest in the new rules. The UK’s Information Commissioner’s Office (ICO) told the Guardian it has seen a rise in breach notifications from organisations, as well as more data protection complaints following the activation of the law.

GDPR 85
article thumbnail

The Digital Privacy Wins Keep Coming

WIRED Threat Level

From *Carpenter v. United States* to a landmark bill in California, privacy advocates sense a shift in what people will accept from Facebook, mobile carriers, and more.

Privacy 92
article thumbnail

EU Mass Surveillance Alive and Well, Privacy Groups Warn

Data Breach Today

Campaigners Seek Court Sanctions to End Blanket Communications Data Retention Privacy rights groups are calling on the Court of Justice of the European Union to clamp down on at least 17 EU governments that require domestic telecommunications firms to store all communications data, despite the court having ruled that such mass surveillance practices are illegal.

Privacy 121
article thumbnail

Conquering Chaos in Process Implementation

Gimmal

Below is a blog post by Gimmal Director of Services Karen Goode. Karen is a valuable leader within our Services organization whose passion for process and project execution has driven some of our most successful implementations. Below, she discusses how an effective project execution framework can help organizations see through the chaos of project management and ensure consistency, efficiency, and repeatability throughout all of their processes.

84
article thumbnail

The Cloud Development Environment Adoption Report

Cloud Development Environments (CDEs) are changing how software teams work by moving development to the cloud. Our Cloud Development Environment Adoption Report gathers insights from 223 developers and business leaders, uncovering key trends in CDE adoption. With 66% of large organizations already using CDEs, these platforms are quickly becoming essential to modern development practices.

article thumbnail

WPA3 Brings New Authentication and Encryption to Wi-Fi

Dark Reading

The Wi-Fi Alliance officially launches its latest protocol, which offers new capabilities for personal, enterprise, and IoT wireless networks.

article thumbnail

WPA3 Wi-Fi Security Will Save You From Yourself

WIRED Threat Level

With better password security and idiot-proof IoT connections, WPA3 will make your internet experience much, much safer.

IoT 102
article thumbnail

Australia's HealthEngine Caught in Data-Sharing Fiasco

Data Breach Today

Medical Appointment Booking Platform Says It Obtains Consent Australia's large online medical booking platform, HealthEngine, has become embroiled in a privacy controversy after it reportedly passed personal medical details to a personal injury law firm. HealthEngine maintains it obtained users' consent, but the revelation appears to have caught many by surprise.

Privacy 117
article thumbnail

How to Prevent DDoS Attacks: 6 Tips to Keep Your Website Safe

eSecurity Planet

A DDoS attack can be costly for your business, so it's best not to give the bad guys a chance. Here are 6 ways you can prevent DDoS attacks.

IT 89
article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Lessons from the front-lines of digital transformation – Part one

TAB OnRecord

Most organizations are involved in some kind of effort to go digital, to stay digital, or to optimize their digital workplace. In a three-part blog post, we will share lessons from the front-lines of digital transformation. These key takeaways from our work with over 90 percent of the Fortune 500 will provide you with important [.] Read More. The post Lessons from the front-lines of digital transformation – Part one appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

How Data Science Experience improves accuracy for the insurance industry

IBM Big Data Hub

In this Q&A, IBM financial services solution architect Irina Saburova discusses an insurance use case with IBM Data Science Marketing Lead Rosie Pongracz. In this scenario common to the insurance industry, an organization needs to adjust its operations based on upcoming weather event and multiple weather indicators can improve forecast accuracy.

article thumbnail

Equifax Coder Settles Insider Trading Charges With SEC

Data Breach Today

Software Engineer Profited From Breach Knowledge, Regulator Alleges An Equifax software engineer has settled an insider trading charge with the U.S. Securities and Exchange Commission after he allegedly earned $77,000 after he made a securities transaction based on his suspicion that the credit bureau had suffered a data breach.